Sciweavers

5153 search results - page 692 / 1031
» Introduction to Randomized Algorithms
Sort
View
DATE
2004
IEEE
123views Hardware» more  DATE 2004»
15 years 8 months ago
On Concurrent Error Detection with Bounded Latency in FSMs
We discuss the problem of concurrent error detection (CED) with bounded latency in finite state machines (FSMs). The objective of this approach is to reduce the overhead of CED, a...
Sobeeh Almukhaizim, Petros Drineas, Yiorgos Makris
CANS
2006
Springer
129views Cryptology» more  CANS 2006»
15 years 8 months ago
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
CG
2006
Springer
15 years 8 months ago
Efficient Selectivity and Backup Operators in Monte-Carlo Tree Search
Monte-Carlo evaluation consists in estimating a position by averaging the outcome of several random continuations, and can serve as an evaluation function at the leaves of a min-ma...
Rémi Coulom
EVOW
2006
Springer
15 years 8 months ago
Continuous-Time Recurrent Neural Networks for Generative and Interactive Musical Performance
This paper describes an ongoing exploration into the use of Continuous-Time Recurrent Neural Networks (CTRNNs) as generative and interactive performance tools, and using Genetic Al...
Oliver Bown, Sebastian Lexer
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 8 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel